Identity protection method, devices and corresponding computer programme product

A technology of computer and identity, applied in the field of identification

Inactive Publication Date: 2010-02-24
GROUPE DE ECOLES DE TELECOMM E
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0034] The description of this classic attack highlights the main disadvantage of the authentication technique used by the EAP-TLS protocol, which forces the client to reveal its identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity protection method, devices and corresponding computer programme product
  • Identity protection method, devices and corresponding computer programme product
  • Identity protection method, devices and corresponding computer programme product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0108] Review of the principles of the invention

[0109] Therefore, the present invention proposes to protect the identity of the client during the authentication process. This protection is even more important, because the identity of users has become a real challenge for operators and access providers, and even for customers themselves who do not want their personal lives to be monitored.

[0110] The main principle of the present invention is based on the encryption of the identity through the security module. on image 3 , Describes an embodiment of the present invention applied to the EAP-TLS protocol. However, the authentication method according to the present invention can be used in any authentication method in which the client sends its identity to the server.

[0111] In the EAP-TLS authentication process, messages are exchanged according to the TLS protocol. During the client authentication handshake session, the client (201) initiates the session through a ClientHello...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention concerns a method for authenticating a client terminal with an authentication server, said client terminal holding an authentication certificate. According to the invention, such a method includes the following phases: obtaining at least one encryption parameter by said client terminal; encrypting said authentication certificate by said client terminal, based on said at least one encryption parameter, delivering an encrypted authentication certificate; transmitting said encrypted authentication certificate to said server; obtaining said one encryption parameter by said server; decrypting said encrypted authentication certificate, based on said one encrypting parameter; authenticating and delivering an authentication assertion if the authentication is positive.

Description

Technical field [0001] The invention relates to the field of identity recognition in the network. [0002] More specifically, the present invention relates to a method for protecting the identity of network users. [0003] The present invention particularly relates to a security module, such as a chip card that allows the secure use of this method, which can be used on a user terminal and / or on a server for authenticating network users. [0004] The invention also relates to a method for managing a plurality of security modules by an authentication server. [0005] Within the scope of the present invention, the term "network" should be understood in the broadest possible sense. It is used to represent home automation networks based on ADSL modems and Wi-Fi access points, public networks equipped with base stations (UMTS, HSDPA, etc.) or hotspots (Wi-Fi, WiMax, etc.), using LAN, PLAN, WLAN or MAN type network company or public service network. [0006] Likewise, the same network must b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L63/0823H04L63/0892H04L2209/80H04L9/32H04L9/3294H04L9/3263
Inventor 帕斯卡尔·尤利恩M·巴德拉
Owner GROUPE DE ECOLES DE TELECOMM E
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products